期刊文献+

Optical encryption scheme based on ghost imaging with disordered speckles 被引量:4

Optical encryption scheme based on ghost imaging with disordered speckles
下载PDF
导出
摘要 An optical encryption scheme based on a ghost imaging system with disordered speckles is proposed to obtain a higher security with a small key. In the scheme, Alice produces the random speckle patterns and obtains the detection results with the help of a computational ghost imaging(CGI) system. Then Alice permutes the order of the random speckle patterns and shares the permutation sequence as a secure key to the authorized users. With the secure key, Bob could recover the object with the principle of the CGI system, whereas, the unauthorized users could not obtain any information of the object. The numerical simulations and experimental results show that the proposed scheme is feasible with a small key, simultaneously,it has a higher security. When the eavesdropping ratio(ER) is less than 40%, the eavesdropper cannot acquire any useful information. Meanwhile, the authorized users could recover completely with the secure key. An optical encryption scheme based on a ghost imaging system with disordered speckles is proposed to obtain a higher security with a small key. In the scheme, Alice produces the random speckle patterns and obtains the detection results with the help of a computational ghost imaging(CGI) system. Then Alice permutes the order of the random speckle patterns and shares the permutation sequence as a secure key to the authorized users. With the secure key, Bob could recover the object with the principle of the CGI system, whereas, the unauthorized users could not obtain any information of the object. The numerical simulations and experimental results show that the proposed scheme is feasible with a small key, simultaneously,it has a higher security. When the eavesdropping ratio(ER) is less than 40%, the eavesdropper cannot acquire any useful information. Meanwhile, the authorized users could recover completely with the secure key.
出处 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第5期160-164,共5页 中国物理B(英文版)
基金 Project supported by the National Natural Science Foundation of China(Grant Nos.61475075 and 61271238) the Open Research Fund of Key Lab of Broadband Wireless Communication and Sensor Network Technology,Ministry of Education,China(Grant No.NYKL2015011)
关键词 ghost encryption secure speckle recover authorized disordered users reconstructed PSNR ghost encryption secure speckle recover authorized disordered users reconstructed PSNR
  • 相关文献

同被引文献28

引证文献4

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部